Abstract
Using edge/fog computing as a distributed entity solves some problems of centralized platforms. Due to the huge number of generated data sensed by the Internet of Things (IoT) devices, efficient processing and data analysis, especially for time-sensitive applications, become necessary. Deploying edge/fog computing solutions offers several benefits, such as closeness to the end user, quick response time, offloading cloud servers, etc. However, this solution can be an attractive target for cyber crime due to its distributed nature, which facilitates the spread of potential threats and risks and affects many devices and much data. Also, edge/fog computing devices are placed in locations and are hosted remotely, which makes them vulnerable to physical damage. In addition, the heterogeneity of edge/fog solutions and IoT devices creates an inconsistency in standardization. Thus providing an optimal security solution for edge/fog computing is significantly challenging. This chapter provides an overview of cyber security for edge/fog computing applications, including the potential risks and threats to edge/fog computing systems, common attack vectors and their impact, and measures and best practices for edge/fog computing security. It highlights the emergent technology and techniques used for security while concluding with some future directions.
| Original language | English |
|---|---|
| Title of host publication | Cyber Security for Next-Generation Computing Technologies |
| Publisher | CRC Press |
| Pages | 177-189 |
| Number of pages | 13 |
| ISBN (Electronic) | 9781003826408 |
| ISBN (Print) | 9781032518992 |
| DOIs | |
| Publication status | Published - Jan 1 2024 |
ASJC Scopus subject areas
- General Computer Science